Search by property
From GCA ACT
Jump to navigationJump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Category:RS.IM-2: Response strategies are updated + (03:24:47, 23 October 2023)
- Category:RS.AN-5: Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers) + (03:24:47, 23 October 2023)
- Category:DE.AE-2: Detected events are analyzed to understand attack targets and methods + (03:24:48, 23 October 2023)
- Category:ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress or attack, during recovery, normal operations) + (03:24:48, 23 October 2023)
- Category:Awareness Training (PR.AT) + (03:24:48, 23 October 2023)
- Category:ID.AM-2: Software platforms and applications within the organization are inventoried + (03:24:48, 23 October 2023)
- Category:RS.AN-2: The impact of the incident is understood + (03:24:48, 23 October 2023)
- Category:ID.RM-2: Organizational risk tolerance is determined and clearly expressed + (03:24:49, 23 October 2023)
- Category:DE.DP-2: Detection activities comply with all applicable requirements + (03:24:49, 23 October 2023)
- Category:PR.DS-4: Adequate capacity to ensure availability is maintained + (03:24:49, 23 October 2023)
- Category:RS.CO-3: Information is shared consistent with response plans + (03:24:49, 23 October 2023)
- Category:PR.IP-11: Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening) + (03:24:49, 23 October 2023)
- Category:ID.RM-1: Risk management processes are established, managed, and agreed to by organizational stakeholders + (03:24:50, 23 October 2023)
- Category:Response Planning (RS.RP) + (03:24:50, 23 October 2023)
- Category:Improvements (RS.IM) + (03:24:50, 23 October 2023)
- Category:ID.SC-2: Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process + (03:24:50, 23 October 2023)
- Category:PR.AT-1: All users are informed and trained + (03:24:50, 23 October 2023)
- Category:PR.IP-10: Response and recovery plans are tested + (03:24:51, 23 October 2023)
- Category:PR.IP-8: Effectiveness of protection technologies is shared + (03:24:51, 23 October 2023)
- Category:PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes + (03:24:51, 23 October 2023)
- Category:PR.DS-2: Data-in-transit is protected + (03:24:51, 23 October 2023)
- Category:RC.CO-2: Reputation is repaired after an incident + (03:24:51, 23 October 2023)
- Category:ID.SC-1: Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders + (03:24:52, 23 October 2023)
- Category:DE.DP-5: Detection processes are continuously improved + (03:24:52, 23 October 2023)
- Category:PR.IP-3: Configuration change control processes are in place + (03:24:52, 23 October 2023)
- Category:ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value + (03:24:52, 23 October 2023)
- Category:DE.CM-8: Vulnerability scans are performed + (03:24:52, 23 October 2023)
- Category:Communications (RC.CO) + (03:24:53, 23 October 2023)
- Category:ID.RA-4: Potential business impacts and likelihoods are identified + (03:24:53, 23 October 2023)
- Category:PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity + (03:24:53, 23 October 2023)
- Category:RECOVER (RC) + (03:24:53, 23 October 2023)
- Category:RS.CO-5: Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness + (03:24:53, 23 October 2023)
- Category:Data Security (PR.DS) + (03:24:54, 23 October 2023)
- Category:PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation) + (03:24:54, 23 October 2023)
- Category:PR.IP-12: A vulnerability management plan is developed and implemented + (03:24:54, 23 October 2023)
- Category:PR.AC-3: Remote access is managed + (03:24:54, 23 October 2023)
- Category:Detection Processes (DE.DP) + (03:24:54, 23 October 2023)
- Category:RS.MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks + (03:24:54, 23 October 2023)
- Category:ID.SC-3: Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan. + (03:24:55, 23 October 2023)
- Category:RC.CO-3: Recovery activities are communicated to internal and external stakeholders as well as executive and management teams + (03:24:55, 23 October 2023)
- Category:Business Environment (ID.BE) + (03:24:55, 23 October 2023)
- Category:RS.MI-1: Incidents are contained + (03:24:55, 23 October 2023)
- Category:RS.AN-1: Notifications from detection systems are investigated + (03:24:55, 23 October 2023)
- Category:RS.CO-4: Coordination with stakeholders occurs consistent with response plans + (03:24:56, 23 October 2023)
- Category:ID.RA-1: Asset vulnerabilities are identified and documented + (03:24:56, 23 October 2023)
- Category:PR.IP-4: Backups of information are conducted, maintained, and tested + (03:24:56, 23 October 2023)
- Category:ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk + (03:24:56, 23 October 2023)
- Category:RS.AN-3: Forensics are performed + (03:24:56, 23 October 2023)
- Category:Communications (RS.CO) + (03:24:57, 23 October 2023)
- Category:RS.CO-2: Incidents are reported consistent with established criteria + (03:24:57, 23 October 2023)
- Category:DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed + (03:24:57, 23 October 2023)
- Category:PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks) + (03:24:57, 23 October 2023)
- Category:PR.IP-6: Data is destroyed according to policy + (03:24:57, 23 October 2023)
- Category:RESPOND (RS) + (03:24:57, 23 October 2023)
- Category:PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition + (03:24:58, 23 October 2023)